A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.
☆17Mar 3, 2023Updated 3 years ago
Alternatives and similar repositories for the-nurse
Users that are interested in the-nurse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆15Feb 11, 2023Updated 3 years ago
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- One of the few OSINT tools non-USA focused, designed to retrieve and verify data for Mexican citizens in the OSINT investigations context…☆13Mar 12, 2023Updated 3 years ago
- Uses the Mozilla Location Services API to determine the location of a device based on the Wi-Fi access points in its vicinity.☆17Feb 15, 2023Updated 3 years ago
- One of the few OSINT tools focused on Mexican citizens, retrieve and verify data about a Security Social Number aka IMSS from a given CU…☆15Apr 6, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OSINT tool to verify phone numbers in Mexico.☆20Mar 12, 2023Updated 3 years ago
- Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.☆41Mar 22, 2023Updated 3 years ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆37Mar 3, 2023Updated 3 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆38Mar 3, 2023Updated 3 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆24Apr 29, 2023Updated 2 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆113Feb 28, 2023Updated 3 years ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆109May 7, 2024Updated last year
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆42May 6, 2023Updated 2 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆276Nov 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Apr 18, 2019Updated 7 years ago
- Escáner ofensivo web en Python: crawling, XSS, SQLi, headers y detección WAF con bypass por proveedor (--waf-xss).☆13Mar 25, 2026Updated 3 weeks ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Mar 22, 2019Updated 7 years ago
- Golang的工具库(Tools of Golang)☆14Updated this week
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- BugSquasher Bug Bounty Tools List☆21Feb 2, 2023Updated 3 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Apr 11, 2026Updated last week
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 8 months ago
- ☆11Nov 5, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 5 years ago
- ☆13Mar 22, 2021Updated 5 years ago
- ☆14Jul 11, 2017Updated 8 years ago
- Easily turn large sets of image urls to an image dataset. Can download, resize and package 100M urls in 20h on one machine.☆14May 24, 2024Updated last year
- Assistant/watchdog for Counterstake Bridge https://counterstake.org☆13Mar 28, 2026Updated 3 weeks ago
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- Common IMAP provider settings☆15Apr 20, 2017Updated 8 years ago